SlideShare une entreprise Scribd logo
1  sur  60
Télécharger pour lire hors ligne
Securing the Unsecured in Cyber Space
Creating Digital Trust in Cyber Era
Cyber Security Cyber Assurance
The need of Enterprises of Tomorrow

Prof. K. Subramanian
SM(IEEE), SMACM, FIETE, FNTF SMCSI,MAIMA,MAIS,MCFE,MISACA(USA)
EX-Professor & Director, Advanced Center for Informatics & Innovative
Learning (ACIIL), IGNOU
Former IT Adviser to CAG of India
Ex-SR.1DDG(NIC), Min of Communications & Information Technology
Former President, Cyber Society of India
Emeritus President, eISSA
Academic Advocate of ISACA (USA) in India

Prof. KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014

1








Cyberspace is
Dynamic, Undefined
and Exponential
Countries’ need
dynamic laws,
keeping pace with
the technological
advancements
In a Virtual Space,
Netizens Exist,
Citizens Don’t!

Trust in E-environments



Lack of a mature IT
society



Absence of Single
governing body



Legislation



High skill inventory



Reduce fear of being
caught



Disgruntled Employees
15th April 2009

1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014
Prof.

2

2









"The poor have sometimes objected to being
governed badly; the rich have always objected to
being governed at all." G. K. Chesterton
“Ever since men began to modify their lives by using
technology they have found themselves in a series of
technological traps.” Roger Revelle
“The law is the last interpretation of the law given by the last
judge.”- Anon.
“Privacy is where technology and the law collide.”
--Richard Smith
(who traced the ‘I Love You’ and ‘Melissa viruses’)
"Technology makes it possible for people to gain
control over everything, except over technology"
John Tudor

1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014
Prof.

3

3
In the Era of Digital Age
•
•
•

•

•

Can all users be identified (e.g.,
employees, contractors, and business
partners)?
Do IT managers know what users
have access to?
Can all the interactions among users,
assets, and applications be identified?
Do IT managers have verifiable
evidence that controls are working,
and appropriate action takes place
when a policy infraction occurs? Does
this evidence exist in minutes rather
than months?
No one standard meets
requirements—Advise on specific
group standards (medical,
commerce/Trade services— Highend-KBPOS)

Ten Important Imperatives

•
•
•
•
•
•
•
•
•
•

IT & Law
Security & Risk
Business Integration
Value to the Enterprise
Alignment = collaboration
Governance and funding
IT sourcing & ITES
outsourcing
Performance Measures
Growing talent
Beyond customer service

1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014
Prof.

4
Perfect Security—A Dream
• "Perfect security is
not achievable,".
• "At the end of the
day, [the security
function] is about
managing the
frequency and
magnitude of loss."

• Concerns
PRIVACY
• vs
• SOCIETY
• SAFETY
•
SECURITY
• Trust

1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014
Prof.

5
“In security matters,
there is nothing like absolute security”
“We are only trying to build comfort levels,
because security costs money and lack of
it costs much more”
“Comfort level is a manifestation of efforts as
well as a realization of its effectiveness &
limitations’
Prof. KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014

6
1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014
Prof.

7
Cyber Threats 2013

Data,
 Mobility,
 Questions of
Responsibility


1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014
Prof.

8

8
15th April 2009

1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014
Prof.

9

9
eSecurity Technologies


Cryptography & Cryptology



Steganography



Digital Water Marking
Digital Rights Management
Cyber Defence technologies (Firewall,
IDS/IPS, Perimeter and Self-Defence )
Access Control &ID Management (Rule, Role,
Demand Based)
Signatures (Digital/Electronic)
Cyber Forensics & Cyber Audit







1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014
Prof.

10

10
Cyber Security – A Holistic View
Authentication
Threat Management Encryption
& Early Warning
Antivirus
Honey Pot
& Decoy
Firewall
Technology
Intrusion
Detection
Vulnerability
Assessment

Policy
Compliance

Proactive
Control

Event &
Incident Mgmt

Access Control
& Authorization
Identity
Config.
Attack
Mgmt
Mgmt
Recovery
Common Tools/Svcs
Console

VPN

Content
Updates &
Security
Response
24x7
Global
Customer
Support

1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014
Prof.
Source: Symantec Inc

11
LOSS OF
CREDIBILITY
INTERCEPTION
SOCIAL
ENGINEERING
ATTACK

ACCIDENTAL
DAMAGE

DATA EMBARRASSMENT
DIDDLING

AUTHORISATION
PROGRAM
CHANGE
SCAVENGING
DOCUMENTATION

PASSWORDS

VIRUS
ATTACK

AUDIT TRAILS

NATURAL
DISASTER
TROJAN
HORSES

INPUT
VALIDATIONS

ANTI-VIRUS
ENCRYPTION
SECURITY
GUARDS

FINANCIAL INCOMPLETE
LOSS PROGRAM
CHANGES
LOSS OF
CUSTOMERS

IS

BACKUPS

HARDWARE
MAINTENANCE
BUSINESS
CONTINUITY
PLAN

UNAUTHORISED
ACCESS

HARDWARE /
SOFTWARE
FAILURE

FRAUD
& THEFT
LOSING TO
12
COMPETITION

1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014
Prof.
1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014
Prof.

13
Government Policy Guidelines
• Policy on :Identity and Access Management: An eGovernance standards initiative to make e-Government
Programs and their services a reality
• Draft Document “e-Governance Information Security
Standard” (Version 01 dated 12th October 2006)--has
proposed additional security controls for E-Governance
purposes Viz., Data security and privacy protection,
Network security, and Application security;
• Draft Document “Base line security requirements &
Selection of controls” (Version 01, 12th October 2 006).

http://egovstandards.gov.in

1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014
Prof.

14
Strategy-Policy-Good Practice
• “Information Security Policy for Protection Critical
Information Infrastructure” (No. CERTIn/NISAP/01, issued on 1st May 2006) –Recent
Guidelines
• Information & Privacy Protection Policy, apart from IT
ACT & RTI ACTS
• Stopping Spam Before It Stops You – SPAM
Policy to be done
• Privacy/Data Protection Legislation-Underway
"Data disposal, anonymity, trust, privacy management,
and systems development activities are just a few of
the many privacy concerns organizations must
address and need to thoughtfully create a privacy
strategy that is clearly and consistently supported by
the KS@2014 csi chennai Lecture Cyber
1/6/2014 top business leaders." Security-->Cyber Assurance Jan 6,2014
Prof.
15
Corporate Governance
Business Assurance Framework
India Initiatives
Global Phenomena
• 1. Clause 49
• Combines Code of • 2. Basel II & III-RBI
UK and SOX of
• 3.SEBI- Corporate
USA
Governance
• Basel II & III
Implementation
directives
• Project
• 4.Risk managementGovernance
RBI & TRAI
• IT Governance
• 5. MCA Initiatives
• Human & Humane • New company Law
Governance
1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014
Prof.
16
2013

16
Learning From Experience
======================
==
1. The only source of knowledge is experience.
-- Einstein

2. One must learn by doing the thing; for though you think you
know it, you have no certainty, until you try.
-- Sophocles

3. Experience is a hard teacher because she gives the test first,
and the lesson afterwards.
-- Vernon Sanders Law
4. Nothing is a waste of time if you use the experience wisely.
-- Rodin

Prof. KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014

17
Known Threat Assessment Approaches

•

Privilege Graph [Dacier et al. 94]
•
•

•

Attack Graph [Philips et al. 98, 01,
02]
•
•

•

Vertices/nodes represent privilege
states
Edges/arcs represent privilege
escalation

Vertices/nodes represent network
states
Edges/arcs represent atomic
exploits

Shortcomings
•
•

•
•

Too many details, very finegrained
Without automation, model
instantiation is cumbersome
Model-checking can help, but
state explosion problem
Insider attacks may succeed
without privilege escalation or
vulnerabilities

Recent Insider Threat Mitigation Tools

• Skybox View
• Sureview from Oakley
Networks
• iGuard from Reconnex
• Content Alarm from
Tablus
• Vontu from Vontu, Inc.
• Rule-based techniques
• Detect policy violations
• Forensics analysis

1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014
Prof.

18
SEMANTIC ISSUES

CERTIFICATION

What is certification; what does
it denote and mean?

TECHNOLOGICAL ISSUES
How is certification achieved?
How are the prerequisites and
context for certification established?

What are the principal concepts
and elements of certification

What is it you are certifying?
(Object of certification)

What additional concepts and
notions are expressed and
implied by certification?

Certification with respect to what?
(Business for certification)

What is the Intent of the
certification; what is it you are
trying to do in certifying
something?

What relation must exist for
certification?
(Object/basis relation)

ADMINISTRATIVE
ISSUES

What activities/decisions are
prerequisite for certification?

Who does the certification?
Who is the recipient of the
certification?

How and when is certification to
be conducted?

What is the significance of the
certification for the certifier?
What is the significance of the
certification for the recipient?
Why certify?

1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014
Prof.

19
Security Assurance - Expectations

“To determine how much is too much, so that
we can implement appropriate security
measures to build adequate confidence and
trust”
“To derive a powerful logic for implementing or not
implementing a security measure”
Prof. KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014

20
Managing Interdependencies
Critical in Enterprises/Institutions
• Infrastructure characteristics (Organizational,
operational, temporal, spatial)

• Environment (economic, legal /regulatory, technical,
social/political)

• Coupling and response behavior

(adaptive,

inflexible, loose/tight, linear/complex)

• Type of failure (common cause, cascading, escalating)

• Types of interdependencies
(Physical, cyber, logical, geographic)

• State of operations
(normal, stressed /disrupted, repair/restoration )

.
Prof. KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014

21
Identity Management
• Identity management is not new, but has evolved
from the days of a single password entry onto the
network to a comprehensive set of processes and
systems that make it easier for all users to access
information in real time and in a much more secure
manner
• ID management tend to center on the technical
improvements in system security, the more important
benefits are the opportunities gained by collaborating
with vendors, suppliers, and customers across the
supply chain.
• A real value of an [ID management] solution enables
ultimately this wide range of business enterprise.
Prof. KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014

22
Biometric System Operates on

•Verification
•Identification
Prof. KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014

23
Biometrics
Biometrics

1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014
Prof.

24
Layered E-trust Framework

Computing E-trust
Services
Shared E-trust
Applications

Trusted Digital Identity
Infrastructure

PKI Technology

Single e-trust

Applications

B2B, B2C, SET, C2C

Infrastructure
Layer 2 Service Provider
Layer 2 Service Provider
example: Identrus
example IDENTRUS

1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014
Prof.

25
Present Risk Certification Issues
Trust
• Trust cannot be bought or sold. It has to be
created
• Trust is earned and not given away.
• Trusted third party or a trusted CA
raises
- trusted in relationship to whom
- trusted by whom?
- trusted for what?
- trusted for how long?

Prof. KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014

26
9 Rules of Risk Management
•

There is no return without risk
•

•

Be Transparent
•

•

A consistent and rigorous approach will
beat a constantly changing strategy

Use common sense
•

•

Multiple risk will produce more consistent
rewards

Sow Discipline
•

•

Risk should be discussed openly

Diversify
•

•

Question the assumptions you make

Communicate
•

•

Risk is measured, and managed by
people, not mathematical models.

Know what you Don’t know
•

•

Rewards to go to those who take risks.

It is better to be approximately right, than
to be precisely wrong.

Return is only half the question
•

Decisions to be made only by considering
the risk and return of the possibilities.

RiskMetrics Group

1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014
Prof.

27
• UNIVERSALITY: Each person should have
the characteristics
• Distinctiveness: Any two persons should be
different in terms of the characteristic.
• Permanence: The characteristic should be
sufficiently in-variant (w.r.to the matching
criterion) over a period of time.
• Collectability: The characteristic should be
quantatively measurable.

1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014
Prof.

28

28
• Uniform Naming convention-absence
• Birth & Death registration-Incomplete
• No social security registration number
• Absence of Identity such as phones,
driving licenses available with every body
• Electoral ID DB- Complete set not there
but at least covers 600-650 m records-not
auditable and verifiable
• Absence of PAN & other ID number for
everybody-Not auditable & verifiable
1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014
Prof.

29
• By Possession
• Password
• Static
• Dynamic

• By Association
• PIN/TOKEN
• By Card
• By Biometrics

• By Government

• PAN(TAXATION)
• Passport
• Social Security
Number
• Citizenship ID NO.
• Senior Citizen
NUMBER

1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014
Prof.
Cognizant Address

23rd June 2005

30

30
•
•
•
•
•
•

Domain Name System (DNS)
Dynamic Host Configuration Protocol (DHCP)
Remote Authentication Dial-In User Service (RADIUS)
Lightweight Directory Access Protocol (LDAP)
Microsoft ’s Active Directory
Novell Directory Services (NDS)

• Public Key Infrastructure (PKI)

1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014
Prof.

31
• Most enterprises have no common, unified
database of user profiles, access rights, and
device identity. This situation has put the
integrity of core infrastructure network
services in jeopardy in the following areas:
• Security.
• Reliability.
• Cost.
• Software Version Control.
• Scalability.
1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014
Prof.

32


Internal Competition
from Liberalization



Learn more about own
Businesses.



World Competition from
Globalization



Reach out to all Business &
Function Heads.



Entrenched Competition
Abroad



Sharpen Internal
Consultancy Competences.



Asymmetry in Scale,
Technology, Brands



Proactively Seize the
Repertoire of MS & Partners



Foster two way flow of IS &
Line Talent.



Industry Shakeouts and
Restructuring

15th April 2009

1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014
Prof.

33

33
Key Areas of Assurance
• Organizational
- Systems in place to identify & mitigate differing risk perceptions of
stakeholders to meet business needs

• Supplier
- Confidence that controls of third party suppliers adequate & meets
organization’s benchmarks

• Business Partners
- Confirmation that security arrangements with partners assess & mitigate
business risk

• Services & IT Systems
- Capability of developers, suppliers of IT services & systems to implement
effective systems to manage risks to the organization’s business
1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014
Prof.

34

34
Benefits of Assurance
• Contributes to effectiveness & efficiency of business operations
• Ensures reliability & continuity of information systems
• Assists in compliance with laws & regulations
• Assures that organizational risk exposure mitigated
• Confirms that internal information accurate & reliable
• Increases investor and lenders confidence

15th April 2009
15th April 2009

Prof. KS@2009: BMS CII Conference
Prof. KS@2009: BMS CII Conference
New delhi April14-15, 2009
New delhi April14-15, 2009

1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014
Prof.

35

35
Cyber Assurance Framework
• Insurance-Protection of classified assets
• Audit—Gives comfort level (Internal/External)
• Pre audit
• Concurrent audit
• Post audit

• Assurance-More degree of comfort as it is multilayered.
•
•
•
•
•
•

Management
Operational
Technology/technical
Network
Legal
Impact
Standards, Standards, Standards
Technical Vs Management













Security
Audit
Interoperability
Interface
(systems/devises/communications)
Architecture/Building
Blocks/reusable
HCI (Human Computer Interface)
Process (Quality & Work)
Environmental (Physical, Safety,
Security)
Data Interchange & mail messaging
(Information/Data Exchange)
Layout/Imprint
BCM





Technical StandardsSpecifications-mainly
for interoperability,
accessibility and
Interactivity
Management
standards-Auditable &
Verifiable-Certification
& Compliance
15th April 2009
15th April 2009

Prof. KS@2009: BMS CII Conference
Prof. KS@2009: BMS CII Conference
New delhi April14-15, 2009
New delhi April14-15, 2009

1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014
Prof.

37

37
Importance of Group Standards -no one standard meets all requirements
ISO 27001/BS7799 Vs COBIT Vs CMM Vs ITIL

Mission

Business Objectives
Business Risks
Applicable Risks
Internal Controls
Review

1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014
Prof.

38
Transition: Insurance Assurance
&
Assurance Layered Framework
•
•
•

•
•
•

Insurance
Audit
Pre, Concurrent, Post
•
•
•
•
•
•
•

•
•

IT Audit
Environmental
Operational
Technology
Network
Financial
Management
Impact

Electronics Continuous Audit
Certification
Assurance

•

•
•

Management
Assurance(GRC)
Operational Assurance
(Risk & ROI)
Technical Assurance
(Availability, Serviceability
& Maintainability)
Revenue Assurance
(Leakage & Fraud)
Legal Compliance &
Assurance (Governance)

1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014
Prof.

39
Cyber Governance Components
• Environmental & ICT
Infrastructure



• Operational (logistics
Integration)
• Technology (synergy &
Convergence)
• Network (multi Modal
Network)
• Management (HRM &
SCM &CRM)







Operational Integration
(Functional)
Professional Integration
(HR)
Emotional/Cultural
Integration
Technology Integration

• Impact (feed-back
correction)

1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014
Prof.

40
Legislative Trust &Techno-Legal issues &
Amendment to IT Act or Legislation of New Acts
• Authentication for retrieval
• Authorized access and control
of access
• Security standards for
certification and mandatory
for compliance for Electronic
Achieves
• Information/Data Protection
(Privacy and Piracy)
• Information management and
Continuous preservation in
Electronic Archives
• Information Assurance and
Auditability

Legal/Regulatory
Framework & Attributes
Effectiveness
Efficiency
Confidentiality
Integrity
Availability
Compliance
Reliability of information

1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014
Prof.

41 41
“IT Regulations and Policies-Compliance &
Management”
Pre-requisites Physical Infrastructure and Mind-set
• PAST: We have inherited a past, for which we cannot be held
•

responsible ;
PRESENT: have fashioned the present on the basis of
development models, which have undergone many mid-course
corrections

• FUTURE: The path to the future -- a future in which India and
Indians will play a dominant role in world affairs -- is replete with
opportunities and challenges.
In a number of key areas, it is necessary Break from the past in
order to achieve our Vision.
We have within ourselves the capacity to succeed

We have to embrace Integrated Security & Cyber Assurance
Framework
1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014
Prof.

42
1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014
Prof.

43
43
CXO~CEO Internal Strategic
Alliances


CIO & CEO
Business Led Info. strategy



CIO & CMO
Competitive Edge & CVP



The Productivity/Performance
Promise

•
•

CIO & CTO

Cost-Benefit Optimization

•



CIO & CFO
Shareholder Value Maximization

•



CIO & CHRO

Employee Performance and Rewards


CIO & Business Partners

Virtual Extended Enterprise

•
•

Capital Productivity
(ROI, EVA, MVA)
Material Productivity
(60% of Cost)
Managerial Productivity
(Information Worker)
Labour Productivity
(Enabled by IW)
Company Productivity
Micro
Factor Productivity
Macro

1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014
Prof.

44
Towards Information/Business
Assurance

• Increasingly, the goal isn't about information
security but about information/Business
assurance, which deals with issues such as
data/information availability and integrity.
• That means organizations should focus not
only on risk avoidance but also on risk
management. "You have to be able to
evaluate risks and articulate them in business
terms“
--Jane Scott-Norris, CISO at the U.S.
State Department
Prof. KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014

45
Comparison of Seals
WEB Certification
Security
of Data

Business
Policies

Transaction
Processing
Integrity

Product

Cost

Privacy
of Data

BBB Online

Low

No

No

Lightly
Covered

No

TRUSTe

Low

Yes

No

No

No

Veri-Sign

Low to
Medium

No

Yes: Data
Transmittal
No: Data Storage

No

No

ICSA

High

Yes

Yes

Somewhat
Covered

Lightly
Covered

WebTrust

High

Yes

Yes

Yes

Yes

1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014
Prof.

46
Security Governance Maturity Model

1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014
Prof.

47
47
Cyber Forensics & Cyber Frauds
•
•
•
•
•
•
•
•

Digital forensics
Email forensics
Image forensics
Video Forensics
Storage Forensics
Audio Forensics
Network forensics
Data/Information forensics

1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014
Prof.

48
Types of Frauds
Conflict of Interest

Nepotism

Gratuities

False Statements

Omissions

Favoritism

False Claims

Forgery

Kickbacks

Misappropriation

Conspiracy

Alterations

Breach of Duty

Bribery

Substitution

Impersonation

Embezzlement

Extortion

1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014
Prof.

49
Common Red Flags Signaling
Management Fraud
o Management decisions are dominated by an individual
or small group.
o Managers’ accounting attitudes are unduly
aggressive.
o Managers place much emphasis on meeting earnings
projections.
o Management’s business reputation is poor.
o Management has engaged in opinion shopping.
o Managers are evasive responding to auditors’ queries.
o Managers engage in frequent disputes with auditors.
o Managers display significant disrespect for regulatory
bodies.
Prof.
o 1/6/2014 KS@2014 csi chennai Lectureinternal control environment.
Company has a weak Cyber Security-->Cyber Assurance Jan 6,2014 50
Common Red Flags Signaling
Management Fraud
o Company accounting personnel are lax or
inexperienced in their duties.
o Company employs inexperienced managers.
o Company is in a period of rapid growth.
o Company profit lags the industry.
o Company has going concern problems (bankruptcy).
o Company is decentralized without adequate
monitoring.
o Company has many difficult accounting measurement
and presentation issues.
o The company may be offered for sale.
1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014
Prof.
51
o The company makes acquisitions using its stock.
Common Red Flags Signaling Employee
Fraud
o Customer
o Missing
complaints.
documents.
o Adjustments to
o Unusual
receivables and
endorsements on
payables.
checks.
o Increased past due
o Unexplained
receivables.
adjustments to
o Inventory shortages.
inventory
o General ledger does
balances.
not balance.
o Unexplained
adjustments to
accounts
1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014
Prof.
52
receivable.
Common Red Flags Signaling Employee
Fraud
o Increased scrap.
o Alterations on
documents.
o Duplicate
payments.
o Employees cannot
be found.
o Documents
photocopied
o Dormant accounts
become active.
o Common names or
addresses for
1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014
Prof.
53
refunds.
o Old items in bank
reconciliations.
o Old outstanding
checks.
o Unusual patterns
in deposits in
transit.
o Cash shortages
and overages.
o Excessive voids
and credit
memos.
“Honest Abraham” Lincoln
After angrily turning
down a bribe, he said,
“Every man has his
price, and he was
getting close to mine.”
Under the right set of
circumstances anyone could
become a fraud perpetrator.
1/6/2014 Prof. KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014

54
IT Security predictions 2014
1.Pirated software*
Pirated software will drive insecurity in much
more dynamic ways than previously realized.
Users of pirated software are afraid to
download updates, thus are exposed to
security risks because their software is
entirely unpatched. Also, newer versions of
pirated software now come with malware preinstalled. As a result, users of pirated
software will become the new “Typhoid
Marys” of the global computing community.
*IBM's X-Force research team
Prof. KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014

55
IT Security Predictions 2013
2.social networks and ups the ante
Social engineering meets social networks and ups the
ante for creative compromises. Criminal
organizations are increasingly sophisticated in how
they attack different social networking sites. For
example, Twitter is being used as a distribution
engine for malware. LinkedIn, however, is being used
for highly targeted attacks against high-value
individuals. We will see these organizations use
these sites in creative new ways in 2010 that will
accelerate compromises and identity theft, especially
as new commercial applications increase the
disclosure of valuable personal information on these
sites.
Prof. KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014

56
IT Security predictions 2014
3.0 Criminals take to the cloud
Criminals take to the cloud. We have
already seen the emergence of “exploits
as a service.” In 2013 we will see
criminals take to cloud computing to
increase their efficiency and
effectiveness.

Prof. KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014

57
IT Security predictions 2014
• a rise in attacks on health care
organizations will occur for similar
reasons,
• continued attacks on retailers big and
small, tax authorities,
• school systems - anywhere where lots
of records are kept by organizations that
haven't traditionally had best practice
security in place
Prof. KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014

58
Security & Governance - Final Message

“In Governance matters
Past
is no guarantee;
Present is imperfect
&
Future is uncertain“
“Failure is not when we fall down, but when we fail 6,2014 59
1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan to get up”
Prof.
Let us Secure and Cyber Assure our Enterprises by Good Governance

FOR FURTHER
INFORMATION PLEASE
CONTACT :






E-MAIL:
ksdir@nic.in

ksmanian48@gmail.com

ksmanian1948@gmail.c
om


ksmanian20032004@ya
hoo.com




91-11-22723557

1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014
Prof.

60

Contenu connexe

Tendances

Business Outsourcing to Asia
Business Outsourcing to AsiaBusiness Outsourcing to Asia
Business Outsourcing to AsiaConferencias FIST
 
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...CODE BLUE
 
ACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of securityACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of securitysiswarren
 
Advanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective ResponsesAdvanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective ResponsesNetIQ
 
Cyber Security_Presentation_KTH
Cyber Security_Presentation_KTHCyber Security_Presentation_KTH
Cyber Security_Presentation_KTHAwais Shibli
 
Close the Security Gaps of a Remote Workforce
Close the Security Gaps of a Remote WorkforceClose the Security Gaps of a Remote Workforce
Close the Security Gaps of a Remote Workforcejlieberman07
 
Protecting the Castle: CYBER CRIME HAS BECOME THE NUMBER ONE PROPERTY CRIME ...
Protecting the Castle:  CYBER CRIME HAS BECOME THE NUMBER ONE PROPERTY CRIME ...Protecting the Castle:  CYBER CRIME HAS BECOME THE NUMBER ONE PROPERTY CRIME ...
Protecting the Castle: CYBER CRIME HAS BECOME THE NUMBER ONE PROPERTY CRIME ...Michael Scheidell
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy finalIndian Air Force
 
The importance of information security nowadays
The importance of information security nowadaysThe importance of information security nowadays
The importance of information security nowadaysPECB
 
National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013Vidushi Singh
 
Secure, Automated Network Access for Any Device on Campus
Secure, Automated Network Access for Any Device on CampusSecure, Automated Network Access for Any Device on Campus
Secure, Automated Network Access for Any Device on CampusCisco Security
 
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...Michael Noel
 
Extending CyberSecurity Beyond The Office Perimeter
Extending CyberSecurity Beyond The Office PerimeterExtending CyberSecurity Beyond The Office Perimeter
Extending CyberSecurity Beyond The Office PerimeterVeriato
 
2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber SecurityPhil Agcaoili
 
netwealth and Sense Of Security webinar: What you need to know about cyber se...
netwealth and Sense Of Security webinar: What you need to know about cyber se...netwealth and Sense Of Security webinar: What you need to know about cyber se...
netwealth and Sense Of Security webinar: What you need to know about cyber se...netwealthInvest
 
Invitation cpe session 29 january 2011 isaca-new_delhichapter
Invitation cpe session 29 january 2011 isaca-new_delhichapterInvitation cpe session 29 january 2011 isaca-new_delhichapter
Invitation cpe session 29 january 2011 isaca-new_delhichapter009nitin
 
Cyber security event
Cyber security eventCyber security event
Cyber security eventTryzens
 

Tendances (20)

Security Awareness
Security AwarenessSecurity Awareness
Security Awareness
 
Business Outsourcing to Asia
Business Outsourcing to AsiaBusiness Outsourcing to Asia
Business Outsourcing to Asia
 
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
 
ACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of securityACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of security
 
Advanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective ResponsesAdvanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective Responses
 
Cyber Security_Presentation_KTH
Cyber Security_Presentation_KTHCyber Security_Presentation_KTH
Cyber Security_Presentation_KTH
 
Industrial IOT Data Connectivity Standard
Industrial IOT Data Connectivity StandardIndustrial IOT Data Connectivity Standard
Industrial IOT Data Connectivity Standard
 
Close the Security Gaps of a Remote Workforce
Close the Security Gaps of a Remote WorkforceClose the Security Gaps of a Remote Workforce
Close the Security Gaps of a Remote Workforce
 
Protecting the Castle: CYBER CRIME HAS BECOME THE NUMBER ONE PROPERTY CRIME ...
Protecting the Castle:  CYBER CRIME HAS BECOME THE NUMBER ONE PROPERTY CRIME ...Protecting the Castle:  CYBER CRIME HAS BECOME THE NUMBER ONE PROPERTY CRIME ...
Protecting the Castle: CYBER CRIME HAS BECOME THE NUMBER ONE PROPERTY CRIME ...
 
Information Security For Small Business
Information Security For Small BusinessInformation Security For Small Business
Information Security For Small Business
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy final
 
The importance of information security nowadays
The importance of information security nowadaysThe importance of information security nowadays
The importance of information security nowadays
 
National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013
 
Secure, Automated Network Access for Any Device on Campus
Secure, Automated Network Access for Any Device on CampusSecure, Automated Network Access for Any Device on Campus
Secure, Automated Network Access for Any Device on Campus
 
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
 
Extending CyberSecurity Beyond The Office Perimeter
Extending CyberSecurity Beyond The Office PerimeterExtending CyberSecurity Beyond The Office Perimeter
Extending CyberSecurity Beyond The Office Perimeter
 
2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security
 
netwealth and Sense Of Security webinar: What you need to know about cyber se...
netwealth and Sense Of Security webinar: What you need to know about cyber se...netwealth and Sense Of Security webinar: What you need to know about cyber se...
netwealth and Sense Of Security webinar: What you need to know about cyber se...
 
Invitation cpe session 29 january 2011 isaca-new_delhichapter
Invitation cpe session 29 january 2011 isaca-new_delhichapterInvitation cpe session 29 january 2011 isaca-new_delhichapter
Invitation cpe session 29 january 2011 isaca-new_delhichapter
 
Cyber security event
Cyber security eventCyber security event
Cyber security event
 

En vedette

Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3
Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3
Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3Jim Gilsinn
 
Integrating the Alphabet Soup of Standards
Integrating the Alphabet Soup of StandardsIntegrating the Alphabet Soup of Standards
Integrating the Alphabet Soup of StandardsJim Gilsinn
 
The Tofino Industrial Security Solution - 7 Steps To Securing Your Industrial...
The Tofino Industrial Security Solution - 7 Steps To Securing Your Industrial...The Tofino Industrial Security Solution - 7 Steps To Securing Your Industrial...
The Tofino Industrial Security Solution - 7 Steps To Securing Your Industrial...Byres Security Inc.
 
Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...
Dubai Cyber Security   01   Ics Scada Cyber Security Solutions and Challenges...Dubai Cyber Security   01   Ics Scada Cyber Security Solutions and Challenges...
Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...Ahmed Al Enizi
 
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...Eran Goldstein
 
JCI Internal Audit Checklist By-Dr.Mahboob Khan Phd
JCI Internal Audit Checklist  By-Dr.Mahboob Khan Phd JCI Internal Audit Checklist  By-Dr.Mahboob Khan Phd
JCI Internal Audit Checklist By-Dr.Mahboob Khan Phd Healthcare consultant
 
Security training module
Security training moduleSecurity training module
Security training modulepagare_c
 
Project audit & review checklist
Project audit & review checklistProject audit & review checklist
Project audit & review checklistRam Srivastava
 
Leadership styles
Leadership stylesLeadership styles
Leadership stylesMohini Sahu
 

En vedette (15)

Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3
Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3
Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3
 
Integrating the Alphabet Soup of Standards
Integrating the Alphabet Soup of StandardsIntegrating the Alphabet Soup of Standards
Integrating the Alphabet Soup of Standards
 
Software engineering
Software engineeringSoftware engineering
Software engineering
 
The Tofino Industrial Security Solution - 7 Steps To Securing Your Industrial...
The Tofino Industrial Security Solution - 7 Steps To Securing Your Industrial...The Tofino Industrial Security Solution - 7 Steps To Securing Your Industrial...
The Tofino Industrial Security Solution - 7 Steps To Securing Your Industrial...
 
Industrial security
Industrial securityIndustrial security
Industrial security
 
Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...
Dubai Cyber Security   01   Ics Scada Cyber Security Solutions and Challenges...Dubai Cyber Security   01   Ics Scada Cyber Security Solutions and Challenges...
Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...
 
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
 
Security training for sis
Security training for sisSecurity training for sis
Security training for sis
 
JCI Internal Audit Checklist By-Dr.Mahboob Khan Phd
JCI Internal Audit Checklist  By-Dr.Mahboob Khan Phd JCI Internal Audit Checklist  By-Dr.Mahboob Khan Phd
JCI Internal Audit Checklist By-Dr.Mahboob Khan Phd
 
Security training module
Security training moduleSecurity training module
Security training module
 
Project audit & review checklist
Project audit & review checklistProject audit & review checklist
Project audit & review checklist
 
Checklist
ChecklistChecklist
Checklist
 
SOP of Security supervisor
SOP of Security supervisorSOP of Security supervisor
SOP of Security supervisor
 
Software testing ppt
Software testing pptSoftware testing ppt
Software testing ppt
 
Leadership styles
Leadership stylesLeadership styles
Leadership styles
 

Similaire à security and assurance lecture jan 14

Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...Emrah Alpa, CISSP CEH CCSK
 
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAECybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE360 BSI
 
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...360 BSI
 
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxmccormicknadine86
 
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxsleeperharwell
 
CISSP Certification Training Course
CISSP Certification Training CourseCISSP Certification Training Course
CISSP Certification Training CourseRicky Lionel Vaz
 
Assocham conf grc sept 13
Assocham conf  grc  sept 13Assocham conf  grc  sept 13
Assocham conf grc sept 13subramanian K
 
Splunk at Aaron's Inc
Splunk at Aaron's IncSplunk at Aaron's Inc
Splunk at Aaron's IncSplunk
 
Virtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - DeloitteVirtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - DeloitteSplunk
 
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAEIT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE360 BSI
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017Maurice Dawson
 
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAEIT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE360 BSI
 
Simplicity in Hybrid IT Environments – A Security Oxymoron?
Simplicity in Hybrid IT Environments – A Security Oxymoron?Simplicity in Hybrid IT Environments – A Security Oxymoron?
Simplicity in Hybrid IT Environments – A Security Oxymoron?Tripwire
 
HEALTHCARE, THE CLOUD, AND ITS SECURITY
HEALTHCARE, THE CLOUD, AND ITS SECURITYHEALTHCARE, THE CLOUD, AND ITS SECURITY
HEALTHCARE, THE CLOUD, AND ITS SECURITYSilverlineCRM
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security toolsVicky Fernandes
 
Heureka Webinar – Security, the Growth Engine for eDiscovery Professionals
Heureka Webinar – Security, the Growth Engine for eDiscovery ProfessionalsHeureka Webinar – Security, the Growth Engine for eDiscovery Professionals
Heureka Webinar – Security, the Growth Engine for eDiscovery ProfessionalsHeureka Software
 
Automatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security StandardsAutomatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security Standardsautomatskicorporation
 
Fissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingFissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingSwati Gupta
 

Similaire à security and assurance lecture jan 14 (20)

Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
 
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAECybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
 
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
 
CISSP-WEB
CISSP-WEBCISSP-WEB
CISSP-WEB
 
Information security presentation
Information security presentationInformation security presentation
Information security presentation
 
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
 
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
 
CISSP Certification Training Course
CISSP Certification Training CourseCISSP Certification Training Course
CISSP Certification Training Course
 
Assocham conf grc sept 13
Assocham conf  grc  sept 13Assocham conf  grc  sept 13
Assocham conf grc sept 13
 
Splunk at Aaron's Inc
Splunk at Aaron's IncSplunk at Aaron's Inc
Splunk at Aaron's Inc
 
Virtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - DeloitteVirtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - Deloitte
 
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAEIT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
 
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAEIT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
 
Simplicity in Hybrid IT Environments – A Security Oxymoron?
Simplicity in Hybrid IT Environments – A Security Oxymoron?Simplicity in Hybrid IT Environments – A Security Oxymoron?
Simplicity in Hybrid IT Environments – A Security Oxymoron?
 
HEALTHCARE, THE CLOUD, AND ITS SECURITY
HEALTHCARE, THE CLOUD, AND ITS SECURITYHEALTHCARE, THE CLOUD, AND ITS SECURITY
HEALTHCARE, THE CLOUD, AND ITS SECURITY
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security tools
 
Heureka Webinar – Security, the Growth Engine for eDiscovery Professionals
Heureka Webinar – Security, the Growth Engine for eDiscovery ProfessionalsHeureka Webinar – Security, the Growth Engine for eDiscovery Professionals
Heureka Webinar – Security, the Growth Engine for eDiscovery Professionals
 
Automatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security StandardsAutomatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security Standards
 
Fissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingFissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-training
 

Plus de subramanian K

Iob gm's lecture 7th jan 2014 GRC and corporate governance in Financial serv...
Iob gm's lecture 7th jan 2014  GRC and corporate governance in Financial serv...Iob gm's lecture 7th jan 2014  GRC and corporate governance in Financial serv...
Iob gm's lecture 7th jan 2014 GRC and corporate governance in Financial serv...subramanian K
 
Innovation,knowledge management & productivity laxammal college,chennai jan 14
Innovation,knowledge management & productivity   laxammal college,chennai jan 14Innovation,knowledge management & productivity   laxammal college,chennai jan 14
Innovation,knowledge management & productivity laxammal college,chennai jan 14subramanian K
 
Innovations in ict for mitigating environmental challenges
Innovations in ict for mitigating environmental challengesInnovations in ict for mitigating environmental challenges
Innovations in ict for mitigating environmental challengessubramanian K
 
Cyber forensics intro & requirement engineering cit dec 21,2013
Cyber forensics intro & requirement engineering cit dec 21,2013Cyber forensics intro & requirement engineering cit dec 21,2013
Cyber forensics intro & requirement engineering cit dec 21,2013subramanian K
 
Csi taramani lecture jan 14 quality assurance in education
Csi taramani lecture jan 14  quality assurance in educationCsi taramani lecture jan 14  quality assurance in education
Csi taramani lecture jan 14 quality assurance in educationsubramanian K
 
Ieee cs lecture sep 2013 digital economy and new generation workforce
Ieee cs lecture sep 2013 digital economy and new generation workforceIeee cs lecture sep 2013 digital economy and new generation workforce
Ieee cs lecture sep 2013 digital economy and new generation workforcesubramanian K
 
Renaissance of electronic engineering fuelling india’s growth ieee-te event k...
Renaissance of electronic engineering fuelling india’s growth ieee-te event k...Renaissance of electronic engineering fuelling india’s growth ieee-te event k...
Renaissance of electronic engineering fuelling india’s growth ieee-te event k...subramanian K
 
Skim lecture @national conference on technoly, innovation & chnge management ...
Skim lecture @national conference on technoly, innovation & chnge management ...Skim lecture @national conference on technoly, innovation & chnge management ...
Skim lecture @national conference on technoly, innovation & chnge management ...subramanian K
 
Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011subramanian K
 
M86 security predictions 2011
M86 security predictions 2011M86 security predictions 2011
M86 security predictions 2011subramanian K
 
Iipa lecture km & good governance jan 12 2011
Iipa lecture  km & good governance  jan 12 2011Iipa lecture  km & good governance  jan 12 2011
Iipa lecture km & good governance jan 12 2011subramanian K
 
Ict4 e india and south asia full report
Ict4 e india and south asia   full reportIct4 e india and south asia   full report
Ict4 e india and south asia full reportsubramanian K
 
Financial inclusion cbt presentation feb 2011
Financial inclusion cbt presentation feb 2011Financial inclusion cbt presentation feb 2011
Financial inclusion cbt presentation feb 2011subramanian K
 
Project Management To Project Governance , Knowledge Management
Project Management To Project Governance , Knowledge ManagementProject Management To Project Governance , Knowledge Management
Project Management To Project Governance , Knowledge Managementsubramanian K
 
Itz Lecture Bi & Web Tech Standards Feb 2009
Itz Lecture Bi & Web Tech Standards Feb 2009Itz Lecture Bi & Web Tech Standards Feb 2009
Itz Lecture Bi & Web Tech Standards Feb 2009subramanian K
 
Empowering The Educators India R & D 2009 Jan 2009
Empowering The Educators India R & D 2009 Jan 2009Empowering The Educators India R & D 2009 Jan 2009
Empowering The Educators India R & D 2009 Jan 2009subramanian K
 
Education ~Skill Development Assocham Conf Feb 2009
Education ~Skill Development  Assocham Conf Feb 2009Education ~Skill Development  Assocham Conf Feb 2009
Education ~Skill Development Assocham Conf Feb 2009subramanian K
 
Architecting E Governance Space Npc Lecture Feb 2009
Architecting E Governance Space Npc Lecture Feb 2009Architecting E Governance Space Npc Lecture Feb 2009
Architecting E Governance Space Npc Lecture Feb 2009subramanian K
 
Securing & Asuring E Governance Services
Securing & Asuring E Governance ServicesSecuring & Asuring E Governance Services
Securing & Asuring E Governance Servicessubramanian K
 

Plus de subramanian K (20)

Iob gm's lecture 7th jan 2014 GRC and corporate governance in Financial serv...
Iob gm's lecture 7th jan 2014  GRC and corporate governance in Financial serv...Iob gm's lecture 7th jan 2014  GRC and corporate governance in Financial serv...
Iob gm's lecture 7th jan 2014 GRC and corporate governance in Financial serv...
 
Innovation,knowledge management & productivity laxammal college,chennai jan 14
Innovation,knowledge management & productivity   laxammal college,chennai jan 14Innovation,knowledge management & productivity   laxammal college,chennai jan 14
Innovation,knowledge management & productivity laxammal college,chennai jan 14
 
Innovations in ict for mitigating environmental challenges
Innovations in ict for mitigating environmental challengesInnovations in ict for mitigating environmental challenges
Innovations in ict for mitigating environmental challenges
 
Cyber forensics intro & requirement engineering cit dec 21,2013
Cyber forensics intro & requirement engineering cit dec 21,2013Cyber forensics intro & requirement engineering cit dec 21,2013
Cyber forensics intro & requirement engineering cit dec 21,2013
 
Csi taramani lecture jan 14 quality assurance in education
Csi taramani lecture jan 14  quality assurance in educationCsi taramani lecture jan 14  quality assurance in education
Csi taramani lecture jan 14 quality assurance in education
 
Ieee cs lecture sep 2013 digital economy and new generation workforce
Ieee cs lecture sep 2013 digital economy and new generation workforceIeee cs lecture sep 2013 digital economy and new generation workforce
Ieee cs lecture sep 2013 digital economy and new generation workforce
 
Renaissance of electronic engineering fuelling india’s growth ieee-te event k...
Renaissance of electronic engineering fuelling india’s growth ieee-te event k...Renaissance of electronic engineering fuelling india’s growth ieee-te event k...
Renaissance of electronic engineering fuelling india’s growth ieee-te event k...
 
Skim lecture @national conference on technoly, innovation & chnge management ...
Skim lecture @national conference on technoly, innovation & chnge management ...Skim lecture @national conference on technoly, innovation & chnge management ...
Skim lecture @national conference on technoly, innovation & chnge management ...
 
Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011
 
M86 security predictions 2011
M86 security predictions 2011M86 security predictions 2011
M86 security predictions 2011
 
Its report 050516
Its report 050516Its report 050516
Its report 050516
 
Iipa lecture km & good governance jan 12 2011
Iipa lecture  km & good governance  jan 12 2011Iipa lecture  km & good governance  jan 12 2011
Iipa lecture km & good governance jan 12 2011
 
Ict4 e india and south asia full report
Ict4 e india and south asia   full reportIct4 e india and south asia   full report
Ict4 e india and south asia full report
 
Financial inclusion cbt presentation feb 2011
Financial inclusion cbt presentation feb 2011Financial inclusion cbt presentation feb 2011
Financial inclusion cbt presentation feb 2011
 
Project Management To Project Governance , Knowledge Management
Project Management To Project Governance , Knowledge ManagementProject Management To Project Governance , Knowledge Management
Project Management To Project Governance , Knowledge Management
 
Itz Lecture Bi & Web Tech Standards Feb 2009
Itz Lecture Bi & Web Tech Standards Feb 2009Itz Lecture Bi & Web Tech Standards Feb 2009
Itz Lecture Bi & Web Tech Standards Feb 2009
 
Empowering The Educators India R & D 2009 Jan 2009
Empowering The Educators India R & D 2009 Jan 2009Empowering The Educators India R & D 2009 Jan 2009
Empowering The Educators India R & D 2009 Jan 2009
 
Education ~Skill Development Assocham Conf Feb 2009
Education ~Skill Development  Assocham Conf Feb 2009Education ~Skill Development  Assocham Conf Feb 2009
Education ~Skill Development Assocham Conf Feb 2009
 
Architecting E Governance Space Npc Lecture Feb 2009
Architecting E Governance Space Npc Lecture Feb 2009Architecting E Governance Space Npc Lecture Feb 2009
Architecting E Governance Space Npc Lecture Feb 2009
 
Securing & Asuring E Governance Services
Securing & Asuring E Governance ServicesSecuring & Asuring E Governance Services
Securing & Asuring E Governance Services
 

Dernier

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 

Dernier (20)

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 

security and assurance lecture jan 14

  • 1. Securing the Unsecured in Cyber Space Creating Digital Trust in Cyber Era Cyber Security Cyber Assurance The need of Enterprises of Tomorrow Prof. K. Subramanian SM(IEEE), SMACM, FIETE, FNTF SMCSI,MAIMA,MAIS,MCFE,MISACA(USA) EX-Professor & Director, Advanced Center for Informatics & Innovative Learning (ACIIL), IGNOU Former IT Adviser to CAG of India Ex-SR.1DDG(NIC), Min of Communications & Information Technology Former President, Cyber Society of India Emeritus President, eISSA Academic Advocate of ISACA (USA) in India Prof. KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014 1
  • 2.     Cyberspace is Dynamic, Undefined and Exponential Countries’ need dynamic laws, keeping pace with the technological advancements In a Virtual Space, Netizens Exist, Citizens Don’t! Trust in E-environments  Lack of a mature IT society  Absence of Single governing body  Legislation  High skill inventory  Reduce fear of being caught  Disgruntled Employees 15th April 2009 1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014 Prof. 2 2
  • 3.      "The poor have sometimes objected to being governed badly; the rich have always objected to being governed at all." G. K. Chesterton “Ever since men began to modify their lives by using technology they have found themselves in a series of technological traps.” Roger Revelle “The law is the last interpretation of the law given by the last judge.”- Anon. “Privacy is where technology and the law collide.” --Richard Smith (who traced the ‘I Love You’ and ‘Melissa viruses’) "Technology makes it possible for people to gain control over everything, except over technology" John Tudor 1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014 Prof. 3 3
  • 4. In the Era of Digital Age • • • • • Can all users be identified (e.g., employees, contractors, and business partners)? Do IT managers know what users have access to? Can all the interactions among users, assets, and applications be identified? Do IT managers have verifiable evidence that controls are working, and appropriate action takes place when a policy infraction occurs? Does this evidence exist in minutes rather than months? No one standard meets requirements—Advise on specific group standards (medical, commerce/Trade services— Highend-KBPOS) Ten Important Imperatives • • • • • • • • • • IT & Law Security & Risk Business Integration Value to the Enterprise Alignment = collaboration Governance and funding IT sourcing & ITES outsourcing Performance Measures Growing talent Beyond customer service 1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014 Prof. 4
  • 5. Perfect Security—A Dream • "Perfect security is not achievable,". • "At the end of the day, [the security function] is about managing the frequency and magnitude of loss." • Concerns PRIVACY • vs • SOCIETY • SAFETY • SECURITY • Trust 1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014 Prof. 5
  • 6. “In security matters, there is nothing like absolute security” “We are only trying to build comfort levels, because security costs money and lack of it costs much more” “Comfort level is a manifestation of efforts as well as a realization of its effectiveness & limitations’ Prof. KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014 6
  • 7. 1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014 Prof. 7
  • 8. Cyber Threats 2013 Data,  Mobility,  Questions of Responsibility  1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014 Prof. 8 8
  • 9. 15th April 2009 1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014 Prof. 9 9
  • 10. eSecurity Technologies  Cryptography & Cryptology  Steganography  Digital Water Marking Digital Rights Management Cyber Defence technologies (Firewall, IDS/IPS, Perimeter and Self-Defence ) Access Control &ID Management (Rule, Role, Demand Based) Signatures (Digital/Electronic) Cyber Forensics & Cyber Audit      1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014 Prof. 10 10
  • 11. Cyber Security – A Holistic View Authentication Threat Management Encryption & Early Warning Antivirus Honey Pot & Decoy Firewall Technology Intrusion Detection Vulnerability Assessment Policy Compliance Proactive Control Event & Incident Mgmt Access Control & Authorization Identity Config. Attack Mgmt Mgmt Recovery Common Tools/Svcs Console VPN Content Updates & Security Response 24x7 Global Customer Support 1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014 Prof. Source: Symantec Inc 11
  • 12. LOSS OF CREDIBILITY INTERCEPTION SOCIAL ENGINEERING ATTACK ACCIDENTAL DAMAGE DATA EMBARRASSMENT DIDDLING AUTHORISATION PROGRAM CHANGE SCAVENGING DOCUMENTATION PASSWORDS VIRUS ATTACK AUDIT TRAILS NATURAL DISASTER TROJAN HORSES INPUT VALIDATIONS ANTI-VIRUS ENCRYPTION SECURITY GUARDS FINANCIAL INCOMPLETE LOSS PROGRAM CHANGES LOSS OF CUSTOMERS IS BACKUPS HARDWARE MAINTENANCE BUSINESS CONTINUITY PLAN UNAUTHORISED ACCESS HARDWARE / SOFTWARE FAILURE FRAUD & THEFT LOSING TO 12 COMPETITION 1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014 Prof.
  • 13. 1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014 Prof. 13
  • 14. Government Policy Guidelines • Policy on :Identity and Access Management: An eGovernance standards initiative to make e-Government Programs and their services a reality • Draft Document “e-Governance Information Security Standard” (Version 01 dated 12th October 2006)--has proposed additional security controls for E-Governance purposes Viz., Data security and privacy protection, Network security, and Application security; • Draft Document “Base line security requirements & Selection of controls” (Version 01, 12th October 2 006). http://egovstandards.gov.in 1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014 Prof. 14
  • 15. Strategy-Policy-Good Practice • “Information Security Policy for Protection Critical Information Infrastructure” (No. CERTIn/NISAP/01, issued on 1st May 2006) –Recent Guidelines • Information & Privacy Protection Policy, apart from IT ACT & RTI ACTS • Stopping Spam Before It Stops You – SPAM Policy to be done • Privacy/Data Protection Legislation-Underway "Data disposal, anonymity, trust, privacy management, and systems development activities are just a few of the many privacy concerns organizations must address and need to thoughtfully create a privacy strategy that is clearly and consistently supported by the KS@2014 csi chennai Lecture Cyber 1/6/2014 top business leaders." Security-->Cyber Assurance Jan 6,2014 Prof. 15
  • 16. Corporate Governance Business Assurance Framework India Initiatives Global Phenomena • 1. Clause 49 • Combines Code of • 2. Basel II & III-RBI UK and SOX of • 3.SEBI- Corporate USA Governance • Basel II & III Implementation directives • Project • 4.Risk managementGovernance RBI & TRAI • IT Governance • 5. MCA Initiatives • Human & Humane • New company Law Governance 1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014 Prof. 16 2013 16
  • 17. Learning From Experience ====================== == 1. The only source of knowledge is experience. -- Einstein 2. One must learn by doing the thing; for though you think you know it, you have no certainty, until you try. -- Sophocles 3. Experience is a hard teacher because she gives the test first, and the lesson afterwards. -- Vernon Sanders Law 4. Nothing is a waste of time if you use the experience wisely. -- Rodin Prof. KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014 17
  • 18. Known Threat Assessment Approaches • Privilege Graph [Dacier et al. 94] • • • Attack Graph [Philips et al. 98, 01, 02] • • • Vertices/nodes represent privilege states Edges/arcs represent privilege escalation Vertices/nodes represent network states Edges/arcs represent atomic exploits Shortcomings • • • • Too many details, very finegrained Without automation, model instantiation is cumbersome Model-checking can help, but state explosion problem Insider attacks may succeed without privilege escalation or vulnerabilities Recent Insider Threat Mitigation Tools • Skybox View • Sureview from Oakley Networks • iGuard from Reconnex • Content Alarm from Tablus • Vontu from Vontu, Inc. • Rule-based techniques • Detect policy violations • Forensics analysis 1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014 Prof. 18
  • 19. SEMANTIC ISSUES CERTIFICATION What is certification; what does it denote and mean? TECHNOLOGICAL ISSUES How is certification achieved? How are the prerequisites and context for certification established? What are the principal concepts and elements of certification What is it you are certifying? (Object of certification) What additional concepts and notions are expressed and implied by certification? Certification with respect to what? (Business for certification) What is the Intent of the certification; what is it you are trying to do in certifying something? What relation must exist for certification? (Object/basis relation) ADMINISTRATIVE ISSUES What activities/decisions are prerequisite for certification? Who does the certification? Who is the recipient of the certification? How and when is certification to be conducted? What is the significance of the certification for the certifier? What is the significance of the certification for the recipient? Why certify? 1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014 Prof. 19
  • 20. Security Assurance - Expectations “To determine how much is too much, so that we can implement appropriate security measures to build adequate confidence and trust” “To derive a powerful logic for implementing or not implementing a security measure” Prof. KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014 20
  • 21. Managing Interdependencies Critical in Enterprises/Institutions • Infrastructure characteristics (Organizational, operational, temporal, spatial) • Environment (economic, legal /regulatory, technical, social/political) • Coupling and response behavior (adaptive, inflexible, loose/tight, linear/complex) • Type of failure (common cause, cascading, escalating) • Types of interdependencies (Physical, cyber, logical, geographic) • State of operations (normal, stressed /disrupted, repair/restoration ) . Prof. KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014 21
  • 22. Identity Management • Identity management is not new, but has evolved from the days of a single password entry onto the network to a comprehensive set of processes and systems that make it easier for all users to access information in real time and in a much more secure manner • ID management tend to center on the technical improvements in system security, the more important benefits are the opportunities gained by collaborating with vendors, suppliers, and customers across the supply chain. • A real value of an [ID management] solution enables ultimately this wide range of business enterprise. Prof. KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014 22
  • 23. Biometric System Operates on •Verification •Identification Prof. KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014 23
  • 24. Biometrics Biometrics 1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014 Prof. 24
  • 25. Layered E-trust Framework Computing E-trust Services Shared E-trust Applications Trusted Digital Identity Infrastructure PKI Technology Single e-trust Applications B2B, B2C, SET, C2C Infrastructure Layer 2 Service Provider Layer 2 Service Provider example: Identrus example IDENTRUS 1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014 Prof. 25
  • 26. Present Risk Certification Issues Trust • Trust cannot be bought or sold. It has to be created • Trust is earned and not given away. • Trusted third party or a trusted CA raises - trusted in relationship to whom - trusted by whom? - trusted for what? - trusted for how long? Prof. KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014 26
  • 27. 9 Rules of Risk Management • There is no return without risk • • Be Transparent • • A consistent and rigorous approach will beat a constantly changing strategy Use common sense • • Multiple risk will produce more consistent rewards Sow Discipline • • Risk should be discussed openly Diversify • • Question the assumptions you make Communicate • • Risk is measured, and managed by people, not mathematical models. Know what you Don’t know • • Rewards to go to those who take risks. It is better to be approximately right, than to be precisely wrong. Return is only half the question • Decisions to be made only by considering the risk and return of the possibilities. RiskMetrics Group 1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014 Prof. 27
  • 28. • UNIVERSALITY: Each person should have the characteristics • Distinctiveness: Any two persons should be different in terms of the characteristic. • Permanence: The characteristic should be sufficiently in-variant (w.r.to the matching criterion) over a period of time. • Collectability: The characteristic should be quantatively measurable. 1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014 Prof. 28 28
  • 29. • Uniform Naming convention-absence • Birth & Death registration-Incomplete • No social security registration number • Absence of Identity such as phones, driving licenses available with every body • Electoral ID DB- Complete set not there but at least covers 600-650 m records-not auditable and verifiable • Absence of PAN & other ID number for everybody-Not auditable & verifiable 1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014 Prof. 29
  • 30. • By Possession • Password • Static • Dynamic • By Association • PIN/TOKEN • By Card • By Biometrics • By Government • PAN(TAXATION) • Passport • Social Security Number • Citizenship ID NO. • Senior Citizen NUMBER 1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014 Prof. Cognizant Address 23rd June 2005 30 30
  • 31. • • • • • • Domain Name System (DNS) Dynamic Host Configuration Protocol (DHCP) Remote Authentication Dial-In User Service (RADIUS) Lightweight Directory Access Protocol (LDAP) Microsoft ’s Active Directory Novell Directory Services (NDS) • Public Key Infrastructure (PKI) 1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014 Prof. 31
  • 32. • Most enterprises have no common, unified database of user profiles, access rights, and device identity. This situation has put the integrity of core infrastructure network services in jeopardy in the following areas: • Security. • Reliability. • Cost. • Software Version Control. • Scalability. 1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014 Prof. 32
  • 33.  Internal Competition from Liberalization  Learn more about own Businesses.  World Competition from Globalization  Reach out to all Business & Function Heads.  Entrenched Competition Abroad  Sharpen Internal Consultancy Competences.  Asymmetry in Scale, Technology, Brands  Proactively Seize the Repertoire of MS & Partners  Foster two way flow of IS & Line Talent.  Industry Shakeouts and Restructuring 15th April 2009 1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014 Prof. 33 33
  • 34. Key Areas of Assurance • Organizational - Systems in place to identify & mitigate differing risk perceptions of stakeholders to meet business needs • Supplier - Confidence that controls of third party suppliers adequate & meets organization’s benchmarks • Business Partners - Confirmation that security arrangements with partners assess & mitigate business risk • Services & IT Systems - Capability of developers, suppliers of IT services & systems to implement effective systems to manage risks to the organization’s business 1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014 Prof. 34 34
  • 35. Benefits of Assurance • Contributes to effectiveness & efficiency of business operations • Ensures reliability & continuity of information systems • Assists in compliance with laws & regulations • Assures that organizational risk exposure mitigated • Confirms that internal information accurate & reliable • Increases investor and lenders confidence 15th April 2009 15th April 2009 Prof. KS@2009: BMS CII Conference Prof. KS@2009: BMS CII Conference New delhi April14-15, 2009 New delhi April14-15, 2009 1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014 Prof. 35 35
  • 36. Cyber Assurance Framework • Insurance-Protection of classified assets • Audit—Gives comfort level (Internal/External) • Pre audit • Concurrent audit • Post audit • Assurance-More degree of comfort as it is multilayered. • • • • • • Management Operational Technology/technical Network Legal Impact
  • 37. Standards, Standards, Standards Technical Vs Management            Security Audit Interoperability Interface (systems/devises/communications) Architecture/Building Blocks/reusable HCI (Human Computer Interface) Process (Quality & Work) Environmental (Physical, Safety, Security) Data Interchange & mail messaging (Information/Data Exchange) Layout/Imprint BCM   Technical StandardsSpecifications-mainly for interoperability, accessibility and Interactivity Management standards-Auditable & Verifiable-Certification & Compliance 15th April 2009 15th April 2009 Prof. KS@2009: BMS CII Conference Prof. KS@2009: BMS CII Conference New delhi April14-15, 2009 New delhi April14-15, 2009 1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014 Prof. 37 37
  • 38. Importance of Group Standards -no one standard meets all requirements ISO 27001/BS7799 Vs COBIT Vs CMM Vs ITIL Mission Business Objectives Business Risks Applicable Risks Internal Controls Review 1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014 Prof. 38
  • 39. Transition: Insurance Assurance & Assurance Layered Framework • • • • • • Insurance Audit Pre, Concurrent, Post • • • • • • • • • IT Audit Environmental Operational Technology Network Financial Management Impact Electronics Continuous Audit Certification Assurance • • • Management Assurance(GRC) Operational Assurance (Risk & ROI) Technical Assurance (Availability, Serviceability & Maintainability) Revenue Assurance (Leakage & Fraud) Legal Compliance & Assurance (Governance) 1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014 Prof. 39
  • 40. Cyber Governance Components • Environmental & ICT Infrastructure  • Operational (logistics Integration) • Technology (synergy & Convergence) • Network (multi Modal Network) • Management (HRM & SCM &CRM)    Operational Integration (Functional) Professional Integration (HR) Emotional/Cultural Integration Technology Integration • Impact (feed-back correction) 1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014 Prof. 40
  • 41. Legislative Trust &Techno-Legal issues & Amendment to IT Act or Legislation of New Acts • Authentication for retrieval • Authorized access and control of access • Security standards for certification and mandatory for compliance for Electronic Achieves • Information/Data Protection (Privacy and Piracy) • Information management and Continuous preservation in Electronic Archives • Information Assurance and Auditability Legal/Regulatory Framework & Attributes Effectiveness Efficiency Confidentiality Integrity Availability Compliance Reliability of information 1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014 Prof. 41 41
  • 42. “IT Regulations and Policies-Compliance & Management” Pre-requisites Physical Infrastructure and Mind-set • PAST: We have inherited a past, for which we cannot be held • responsible ; PRESENT: have fashioned the present on the basis of development models, which have undergone many mid-course corrections • FUTURE: The path to the future -- a future in which India and Indians will play a dominant role in world affairs -- is replete with opportunities and challenges. In a number of key areas, it is necessary Break from the past in order to achieve our Vision. We have within ourselves the capacity to succeed We have to embrace Integrated Security & Cyber Assurance Framework 1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014 Prof. 42
  • 43. 1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014 Prof. 43 43
  • 44. CXO~CEO Internal Strategic Alliances  CIO & CEO Business Led Info. strategy  CIO & CMO Competitive Edge & CVP  The Productivity/Performance Promise • • CIO & CTO Cost-Benefit Optimization •  CIO & CFO Shareholder Value Maximization •  CIO & CHRO Employee Performance and Rewards  CIO & Business Partners Virtual Extended Enterprise • • Capital Productivity (ROI, EVA, MVA) Material Productivity (60% of Cost) Managerial Productivity (Information Worker) Labour Productivity (Enabled by IW) Company Productivity Micro Factor Productivity Macro 1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014 Prof. 44
  • 45. Towards Information/Business Assurance • Increasingly, the goal isn't about information security but about information/Business assurance, which deals with issues such as data/information availability and integrity. • That means organizations should focus not only on risk avoidance but also on risk management. "You have to be able to evaluate risks and articulate them in business terms“ --Jane Scott-Norris, CISO at the U.S. State Department Prof. KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014 45
  • 46. Comparison of Seals WEB Certification Security of Data Business Policies Transaction Processing Integrity Product Cost Privacy of Data BBB Online Low No No Lightly Covered No TRUSTe Low Yes No No No Veri-Sign Low to Medium No Yes: Data Transmittal No: Data Storage No No ICSA High Yes Yes Somewhat Covered Lightly Covered WebTrust High Yes Yes Yes Yes 1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014 Prof. 46
  • 47. Security Governance Maturity Model 1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014 Prof. 47 47
  • 48. Cyber Forensics & Cyber Frauds • • • • • • • • Digital forensics Email forensics Image forensics Video Forensics Storage Forensics Audio Forensics Network forensics Data/Information forensics 1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014 Prof. 48
  • 49. Types of Frauds Conflict of Interest Nepotism Gratuities False Statements Omissions Favoritism False Claims Forgery Kickbacks Misappropriation Conspiracy Alterations Breach of Duty Bribery Substitution Impersonation Embezzlement Extortion 1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014 Prof. 49
  • 50. Common Red Flags Signaling Management Fraud o Management decisions are dominated by an individual or small group. o Managers’ accounting attitudes are unduly aggressive. o Managers place much emphasis on meeting earnings projections. o Management’s business reputation is poor. o Management has engaged in opinion shopping. o Managers are evasive responding to auditors’ queries. o Managers engage in frequent disputes with auditors. o Managers display significant disrespect for regulatory bodies. Prof. o 1/6/2014 KS@2014 csi chennai Lectureinternal control environment. Company has a weak Cyber Security-->Cyber Assurance Jan 6,2014 50
  • 51. Common Red Flags Signaling Management Fraud o Company accounting personnel are lax or inexperienced in their duties. o Company employs inexperienced managers. o Company is in a period of rapid growth. o Company profit lags the industry. o Company has going concern problems (bankruptcy). o Company is decentralized without adequate monitoring. o Company has many difficult accounting measurement and presentation issues. o The company may be offered for sale. 1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014 Prof. 51 o The company makes acquisitions using its stock.
  • 52. Common Red Flags Signaling Employee Fraud o Customer o Missing complaints. documents. o Adjustments to o Unusual receivables and endorsements on payables. checks. o Increased past due o Unexplained receivables. adjustments to o Inventory shortages. inventory o General ledger does balances. not balance. o Unexplained adjustments to accounts 1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014 Prof. 52 receivable.
  • 53. Common Red Flags Signaling Employee Fraud o Increased scrap. o Alterations on documents. o Duplicate payments. o Employees cannot be found. o Documents photocopied o Dormant accounts become active. o Common names or addresses for 1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014 Prof. 53 refunds. o Old items in bank reconciliations. o Old outstanding checks. o Unusual patterns in deposits in transit. o Cash shortages and overages. o Excessive voids and credit memos.
  • 54. “Honest Abraham” Lincoln After angrily turning down a bribe, he said, “Every man has his price, and he was getting close to mine.” Under the right set of circumstances anyone could become a fraud perpetrator. 1/6/2014 Prof. KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014 54
  • 55. IT Security predictions 2014 1.Pirated software* Pirated software will drive insecurity in much more dynamic ways than previously realized. Users of pirated software are afraid to download updates, thus are exposed to security risks because their software is entirely unpatched. Also, newer versions of pirated software now come with malware preinstalled. As a result, users of pirated software will become the new “Typhoid Marys” of the global computing community. *IBM's X-Force research team Prof. KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014 55
  • 56. IT Security Predictions 2013 2.social networks and ups the ante Social engineering meets social networks and ups the ante for creative compromises. Criminal organizations are increasingly sophisticated in how they attack different social networking sites. For example, Twitter is being used as a distribution engine for malware. LinkedIn, however, is being used for highly targeted attacks against high-value individuals. We will see these organizations use these sites in creative new ways in 2010 that will accelerate compromises and identity theft, especially as new commercial applications increase the disclosure of valuable personal information on these sites. Prof. KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014 56
  • 57. IT Security predictions 2014 3.0 Criminals take to the cloud Criminals take to the cloud. We have already seen the emergence of “exploits as a service.” In 2013 we will see criminals take to cloud computing to increase their efficiency and effectiveness. Prof. KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014 57
  • 58. IT Security predictions 2014 • a rise in attacks on health care organizations will occur for similar reasons, • continued attacks on retailers big and small, tax authorities, • school systems - anywhere where lots of records are kept by organizations that haven't traditionally had best practice security in place Prof. KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014 58
  • 59. Security & Governance - Final Message “In Governance matters Past is no guarantee; Present is imperfect & Future is uncertain“ “Failure is not when we fall down, but when we fail 6,2014 59 1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan to get up” Prof.
  • 60. Let us Secure and Cyber Assure our Enterprises by Good Governance FOR FURTHER INFORMATION PLEASE CONTACT :    E-MAIL: ksdir@nic.in ksmanian48@gmail.com ksmanian1948@gmail.c om  ksmanian20032004@ya hoo.com   91-11-22723557 1/6/2014 KS@2014 csi chennai Lecture Cyber Security-->Cyber Assurance Jan 6,2014 Prof. 60